NCC Group Research Blog
The Mobile Application Hacker’s Handbook
5 months ago
The Myth of Twelve More Bytes: Security on the Post-Scarcity Internet
5 months ago
The Importance of a Cryptographic Review
5 months ago
The L4m3ne55 of Passw0rds: Notes from the field
5 months ago
The facts about BadUSB
5 months ago
The Future of C Code Review
5 months ago
The Extended AWS Security Ramp-Up Guide
5 months ago
The factoring dead: Preparing for the cryptopocalypse
5 months ago
The disadvantages of a blacklist-based approach to input validation
5 months ago
The economics of defensive security
5 months ago
The death of USB autorun and the rise of the USB keyboard
5 months ago
The Demise of Signature Based Antivirus
5 months ago
The Database Hacker’s Handbook
5 months ago
The Challenges of Fuzzing 5G Protocols
5 months ago
The CIS Security Standard for Docker available now
5 months ago
The Case of Missing File Extensions
5 months ago
The CERT® C Coding Standard, Second Edition: 98 Rules for Developing Safe, Reliable, and Secure Systems
5 months ago
The Automotive Threat Modeling Template
5 months ago
The Browser Hacker’s Handbook
5 months ago
Checked
2 hours 42 minutes ago